Hay
Date
June 25, 2025, 8:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.455606] ==================================================================
[   26.455658] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   26.455709] Write of size 1 at addr fff00000c470f6d0 by task kunit_try_catch/170
[   26.455768] 
[   26.455803] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.455883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.455909] Hardware name: linux,dummy-virt (DT)
[   26.455938] Call trace:
[   26.455958]  show_stack+0x20/0x38 (C)
[   26.456254]  dump_stack_lvl+0x8c/0xd0
[   26.456371]  print_report+0x118/0x608
[   26.456496]  kasan_report+0xdc/0x128
[   26.456601]  __asan_report_store1_noabort+0x20/0x30
[   26.456692]  krealloc_less_oob_helper+0xb9c/0xc50
[   26.456782]  krealloc_less_oob+0x20/0x38
[   26.456834]  kunit_try_run_case+0x170/0x3f0
[   26.456882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.456933]  kthread+0x328/0x630
[   26.457161]  ret_from_fork+0x10/0x20
[   26.457358] 
[   26.457503] Allocated by task 170:
[   26.457603]  kasan_save_stack+0x3c/0x68
[   26.457679]  kasan_save_track+0x20/0x40
[   26.457716]  kasan_save_alloc_info+0x40/0x58
[   26.457816]  __kasan_krealloc+0x118/0x178
[   26.458119]  krealloc_noprof+0x128/0x360
[   26.458266]  krealloc_less_oob_helper+0x168/0xc50
[   26.458390]  krealloc_less_oob+0x20/0x38
[   26.458537]  kunit_try_run_case+0x170/0x3f0
[   26.458596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.458638]  kthread+0x328/0x630
[   26.459042]  ret_from_fork+0x10/0x20
[   26.459125] 
[   26.459163] The buggy address belongs to the object at fff00000c470f600
[   26.459163]  which belongs to the cache kmalloc-256 of size 256
[   26.459250] The buggy address is located 7 bytes to the right of
[   26.459250]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.459575] 
[   26.459677] The buggy address belongs to the physical page:
[   26.459773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.459825] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.459891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.459941] page_type: f5(slab)
[   26.459978] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.460035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.460083] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.460145] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.460192] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.460252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.460306] page dumped because: kasan: bad access detected
[   26.460345] 
[   26.460362] Memory state around the buggy address:
[   26.460391]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.460442]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.460483] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.460519]                                                  ^
[   26.460563]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.460614]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.460650] ==================================================================
[   26.511476] ==================================================================
[   26.511519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   26.511561] Write of size 1 at addr fff00000c78260ea by task kunit_try_catch/174
[   26.511606] 
[   26.511632] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.511709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.511740] Hardware name: linux,dummy-virt (DT)
[   26.511778] Call trace:
[   26.511804]  show_stack+0x20/0x38 (C)
[   26.511848]  dump_stack_lvl+0x8c/0xd0
[   26.511902]  print_report+0x118/0x608
[   26.512851]  kasan_report+0xdc/0x128
[   26.512937]  __asan_report_store1_noabort+0x20/0x30
[   26.513031]  krealloc_less_oob_helper+0xae4/0xc50
[   26.513119]  krealloc_large_less_oob+0x20/0x38
[   26.513223]  kunit_try_run_case+0x170/0x3f0
[   26.513459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.513596]  kthread+0x328/0x630
[   26.513640]  ret_from_fork+0x10/0x20
[   26.513999] 
[   26.514183] The buggy address belongs to the physical page:
[   26.514263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.514511] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.514577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.514760] page_type: f8(unknown)
[   26.514860] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.515015] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.515195] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.515370] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.515503] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.515944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.516017] page dumped because: kasan: bad access detected
[   26.516113] 
[   26.516167] Memory state around the buggy address:
[   26.516220]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.516262]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.516302] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.516552]                                                           ^
[   26.516732]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.517183]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.517503] ==================================================================
[   26.518984] ==================================================================
[   26.519028] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   26.519227] Write of size 1 at addr fff00000c78260eb by task kunit_try_catch/174
[   26.519288] 
[   26.519370] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.519640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.519736] Hardware name: linux,dummy-virt (DT)
[   26.519814] Call trace:
[   26.519874]  show_stack+0x20/0x38 (C)
[   26.519981]  dump_stack_lvl+0x8c/0xd0
[   26.520028]  print_report+0x118/0x608
[   26.520453]  kasan_report+0xdc/0x128
[   26.520678]  __asan_report_store1_noabort+0x20/0x30
[   26.520906]  krealloc_less_oob_helper+0xa58/0xc50
[   26.520980]  krealloc_large_less_oob+0x20/0x38
[   26.521299]  kunit_try_run_case+0x170/0x3f0
[   26.521542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.521801]  kthread+0x328/0x630
[   26.521857]  ret_from_fork+0x10/0x20
[   26.522125] 
[   26.522295] The buggy address belongs to the physical page:
[   26.522452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.522555] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.522628] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.522863] page_type: f8(unknown)
[   26.523024] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.523145] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.523273] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.523462] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.523632] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.523713] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.523930] page dumped because: kasan: bad access detected
[   26.524177] 
[   26.524231] Memory state around the buggy address:
[   26.524276]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.524827]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.525270] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.525316]                                                           ^
[   26.525741]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.525895]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.526167] ==================================================================
[   26.502134] ==================================================================
[   26.502176] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   26.502330] Write of size 1 at addr fff00000c78260d0 by task kunit_try_catch/174
[   26.502603] 
[   26.502700] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.502783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.502907] Hardware name: linux,dummy-virt (DT)
[   26.502969] Call trace:
[   26.503007]  show_stack+0x20/0x38 (C)
[   26.503155]  dump_stack_lvl+0x8c/0xd0
[   26.503209]  print_report+0x118/0x608
[   26.503352]  kasan_report+0xdc/0x128
[   26.503414]  __asan_report_store1_noabort+0x20/0x30
[   26.503461]  krealloc_less_oob_helper+0xb9c/0xc50
[   26.503769]  krealloc_large_less_oob+0x20/0x38
[   26.503866]  kunit_try_run_case+0x170/0x3f0
[   26.503975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.504097]  kthread+0x328/0x630
[   26.504220]  ret_from_fork+0x10/0x20
[   26.504265] 
[   26.504310] The buggy address belongs to the physical page:
[   26.504342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.504635] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.504852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.504983] page_type: f8(unknown)
[   26.505020] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.505348] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.505442] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.505563] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.505689] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.505865] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.505922] page dumped because: kasan: bad access detected
[   26.506052] 
[   26.506168] Memory state around the buggy address:
[   26.506204]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.506249]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.506366] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.506425]                                                  ^
[   26.506459]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.506499]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.506536] ==================================================================
[   26.508666] ==================================================================
[   26.508844] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   26.508904] Write of size 1 at addr fff00000c78260da by task kunit_try_catch/174
[   26.508951] 
[   26.508980] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.509069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.509094] Hardware name: linux,dummy-virt (DT)
[   26.509122] Call trace:
[   26.509491]  show_stack+0x20/0x38 (C)
[   26.509614]  dump_stack_lvl+0x8c/0xd0
[   26.509673]  print_report+0x118/0x608
[   26.509913]  kasan_report+0xdc/0x128
[   26.510087]  __asan_report_store1_noabort+0x20/0x30
[   26.510224]  krealloc_less_oob_helper+0xa80/0xc50
[   26.510276]  krealloc_large_less_oob+0x20/0x38
[   26.510331]  kunit_try_run_case+0x170/0x3f0
[   26.510424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.510479]  kthread+0x328/0x630
[   26.510520]  ret_from_fork+0x10/0x20
[   26.510574] 
[   26.510593] The buggy address belongs to the physical page:
[   26.510624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.510673] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.510716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.510769] page_type: f8(unknown)
[   26.510806] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.510863] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.510919] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.510967] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.511013] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.511059] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.511097] page dumped because: kasan: bad access detected
[   26.511125] 
[   26.511143] Memory state around the buggy address:
[   26.511171]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.511211]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.511259] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.511295]                                                     ^
[   26.511329]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.511368]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.511424] ==================================================================
[   26.497726] ==================================================================
[   26.497822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   26.497922] Write of size 1 at addr fff00000c78260c9 by task kunit_try_catch/174
[   26.498037] 
[   26.498069] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.498154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.498351] Hardware name: linux,dummy-virt (DT)
[   26.498406] Call trace:
[   26.498456]  show_stack+0x20/0x38 (C)
[   26.498532]  dump_stack_lvl+0x8c/0xd0
[   26.498645]  print_report+0x118/0x608
[   26.498701]  kasan_report+0xdc/0x128
[   26.498746]  __asan_report_store1_noabort+0x20/0x30
[   26.498809]  krealloc_less_oob_helper+0xa48/0xc50
[   26.498856]  krealloc_large_less_oob+0x20/0x38
[   26.498905]  kunit_try_run_case+0x170/0x3f0
[   26.499080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.499168]  kthread+0x328/0x630
[   26.499228]  ret_from_fork+0x10/0x20
[   26.499300] 
[   26.499339] The buggy address belongs to the physical page:
[   26.499407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824
[   26.499466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.499570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.499647] page_type: f8(unknown)
[   26.499701] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.499749] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.499907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.499974] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   26.500258] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff
[   26.500339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.500377] page dumped because: kasan: bad access detected
[   26.500564] 
[   26.500583] Memory state around the buggy address:
[   26.500828]  fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.500901]  fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.500987] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.501104]                                               ^
[   26.501138]  fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.501324]  fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.501470] ==================================================================
[   26.466552] ==================================================================
[   26.466640] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   26.466690] Write of size 1 at addr fff00000c470f6ea by task kunit_try_catch/170
[   26.466737] 
[   26.466765] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.466843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.466868] Hardware name: linux,dummy-virt (DT)
[   26.466917] Call trace:
[   26.467051]  show_stack+0x20/0x38 (C)
[   26.467133]  dump_stack_lvl+0x8c/0xd0
[   26.467266]  print_report+0x118/0x608
[   26.467354]  kasan_report+0xdc/0x128
[   26.467413]  __asan_report_store1_noabort+0x20/0x30
[   26.467730]  krealloc_less_oob_helper+0xae4/0xc50
[   26.467790]  krealloc_less_oob+0x20/0x38
[   26.467944]  kunit_try_run_case+0x170/0x3f0
[   26.468228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.468380]  kthread+0x328/0x630
[   26.468562]  ret_from_fork+0x10/0x20
[   26.468681] 
[   26.468749] Allocated by task 170:
[   26.468865]  kasan_save_stack+0x3c/0x68
[   26.468934]  kasan_save_track+0x20/0x40
[   26.469092]  kasan_save_alloc_info+0x40/0x58
[   26.469186]  __kasan_krealloc+0x118/0x178
[   26.469226]  krealloc_noprof+0x128/0x360
[   26.469261]  krealloc_less_oob_helper+0x168/0xc50
[   26.469299]  krealloc_less_oob+0x20/0x38
[   26.469438]  kunit_try_run_case+0x170/0x3f0
[   26.469593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.469638]  kthread+0x328/0x630
[   26.469886]  ret_from_fork+0x10/0x20
[   26.469935] 
[   26.470022] The buggy address belongs to the object at fff00000c470f600
[   26.470022]  which belongs to the cache kmalloc-256 of size 256
[   26.470149] The buggy address is located 33 bytes to the right of
[   26.470149]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.470232] 
[   26.470259] The buggy address belongs to the physical page:
[   26.470356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.470481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.470863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.471026] page_type: f5(slab)
[   26.471111] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.471220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.471317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.471470] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.471584] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.471634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.471847] page dumped because: kasan: bad access detected
[   26.471893] 
[   26.471910] Memory state around the buggy address:
[   26.472030]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472072]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.472113] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.472148]                                                           ^
[   26.472420]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472648]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472792] ==================================================================
[   26.461556] ==================================================================
[   26.461628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   26.461706] Write of size 1 at addr fff00000c470f6da by task kunit_try_catch/170
[   26.461780] 
[   26.461827] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.461907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.461977] Hardware name: linux,dummy-virt (DT)
[   26.462123] Call trace:
[   26.462151]  show_stack+0x20/0x38 (C)
[   26.462247]  dump_stack_lvl+0x8c/0xd0
[   26.462314]  print_report+0x118/0x608
[   26.462360]  kasan_report+0xdc/0x128
[   26.462436]  __asan_report_store1_noabort+0x20/0x30
[   26.462496]  krealloc_less_oob_helper+0xa80/0xc50
[   26.462560]  krealloc_less_oob+0x20/0x38
[   26.462605]  kunit_try_run_case+0x170/0x3f0
[   26.462651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.462701]  kthread+0x328/0x630
[   26.462909]  ret_from_fork+0x10/0x20
[   26.462961] 
[   26.462979] Allocated by task 170:
[   26.463038]  kasan_save_stack+0x3c/0x68
[   26.463114]  kasan_save_track+0x20/0x40
[   26.463161]  kasan_save_alloc_info+0x40/0x58
[   26.463237]  __kasan_krealloc+0x118/0x178
[   26.463284]  krealloc_noprof+0x128/0x360
[   26.463320]  krealloc_less_oob_helper+0x168/0xc50
[   26.463376]  krealloc_less_oob+0x20/0x38
[   26.463425]  kunit_try_run_case+0x170/0x3f0
[   26.463460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.463713]  kthread+0x328/0x630
[   26.463804]  ret_from_fork+0x10/0x20
[   26.463862] 
[   26.463963] The buggy address belongs to the object at fff00000c470f600
[   26.463963]  which belongs to the cache kmalloc-256 of size 256
[   26.464071] The buggy address is located 17 bytes to the right of
[   26.464071]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.464170] 
[   26.464197] The buggy address belongs to the physical page:
[   26.464255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.464305] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.464349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.464407] page_type: f5(slab)
[   26.464443] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.464490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.464538] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.464725] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.464832] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.464925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.465022] page dumped because: kasan: bad access detected
[   26.465074] 
[   26.465156] Memory state around the buggy address:
[   26.465205]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465246]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.465503] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.465623]                                                     ^
[   26.465708]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465766]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465810] ==================================================================
[   26.447407] ==================================================================
[   26.447819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   26.447903] Write of size 1 at addr fff00000c470f6c9 by task kunit_try_catch/170
[   26.448008] 
[   26.448088] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.448191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.448216] Hardware name: linux,dummy-virt (DT)
[   26.448249] Call trace:
[   26.448272]  show_stack+0x20/0x38 (C)
[   26.448375]  dump_stack_lvl+0x8c/0xd0
[   26.448580]  print_report+0x118/0x608
[   26.448684]  kasan_report+0xdc/0x128
[   26.448730]  __asan_report_store1_noabort+0x20/0x30
[   26.448923]  krealloc_less_oob_helper+0xa48/0xc50
[   26.449068]  krealloc_less_oob+0x20/0x38
[   26.449209]  kunit_try_run_case+0x170/0x3f0
[   26.449329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.449464]  kthread+0x328/0x630
[   26.449613]  ret_from_fork+0x10/0x20
[   26.449700] 
[   26.449782] Allocated by task 170:
[   26.449869]  kasan_save_stack+0x3c/0x68
[   26.449999]  kasan_save_track+0x20/0x40
[   26.450092]  kasan_save_alloc_info+0x40/0x58
[   26.450179]  __kasan_krealloc+0x118/0x178
[   26.450301]  krealloc_noprof+0x128/0x360
[   26.450340]  krealloc_less_oob_helper+0x168/0xc50
[   26.450411]  krealloc_less_oob+0x20/0x38
[   26.450446]  kunit_try_run_case+0x170/0x3f0
[   26.450495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.450747]  kthread+0x328/0x630
[   26.450845]  ret_from_fork+0x10/0x20
[   26.450970] 
[   26.451030] The buggy address belongs to the object at fff00000c470f600
[   26.451030]  which belongs to the cache kmalloc-256 of size 256
[   26.451104] The buggy address is located 0 bytes to the right of
[   26.451104]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.451327] 
[   26.451602] The buggy address belongs to the physical page:
[   26.451723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.451797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.451843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.452218] page_type: f5(slab)
[   26.452322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.452371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.452578] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.452798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.452915] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.453076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.453135] page dumped because: kasan: bad access detected
[   26.453427] 
[   26.453521] Memory state around the buggy address:
[   26.453581]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.453656]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.453762] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.453799]                                               ^
[   26.453878]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.454164]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.454325] ==================================================================
[   26.473634] ==================================================================
[   26.473729] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   26.473799] Write of size 1 at addr fff00000c470f6eb by task kunit_try_catch/170
[   26.473873] 
[   26.473902] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   26.473981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.474012] Hardware name: linux,dummy-virt (DT)
[   26.474042] Call trace:
[   26.474062]  show_stack+0x20/0x38 (C)
[   26.474117]  dump_stack_lvl+0x8c/0xd0
[   26.474173]  print_report+0x118/0x608
[   26.474219]  kasan_report+0xdc/0x128
[   26.474262]  __asan_report_store1_noabort+0x20/0x30
[   26.474308]  krealloc_less_oob_helper+0xa58/0xc50
[   26.474355]  krealloc_less_oob+0x20/0x38
[   26.474410]  kunit_try_run_case+0x170/0x3f0
[   26.474457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.474507]  kthread+0x328/0x630
[   26.474549]  ret_from_fork+0x10/0x20
[   26.474595] 
[   26.474618] Allocated by task 170:
[   26.474645]  kasan_save_stack+0x3c/0x68
[   26.474693]  kasan_save_track+0x20/0x40
[   26.474730]  kasan_save_alloc_info+0x40/0x58
[   26.474771]  __kasan_krealloc+0x118/0x178
[   26.474808]  krealloc_noprof+0x128/0x360
[   26.474844]  krealloc_less_oob_helper+0x168/0xc50
[   26.474882]  krealloc_less_oob+0x20/0x38
[   26.474917]  kunit_try_run_case+0x170/0x3f0
[   26.474961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.475004]  kthread+0x328/0x630
[   26.475035]  ret_from_fork+0x10/0x20
[   26.475069] 
[   26.475087] The buggy address belongs to the object at fff00000c470f600
[   26.475087]  which belongs to the cache kmalloc-256 of size 256
[   26.475146] The buggy address is located 34 bytes to the right of
[   26.475146]  allocated 201-byte region [fff00000c470f600, fff00000c470f6c9)
[   26.475207] 
[   26.475225] The buggy address belongs to the physical page:
[   26.475254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e
[   26.475310] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.475363] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.475422] page_type: f5(slab)
[   26.475461] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.475640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.475695] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   26.475741] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.476028] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff
[   26.476130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.476169] page dumped because: kasan: bad access detected
[   26.476199] 
[   26.476284] Memory state around the buggy address:
[   26.476333]  fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.476375]  fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.476425] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   26.476461]                                                           ^
[   26.476496]  fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.476536]  fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.476574] ==================================================================

[   21.605093] ==================================================================
[   21.605383] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   21.606285] Write of size 1 at addr ffff88810038c8eb by task kunit_try_catch/187
[   21.606715] 
[   21.606820] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.606901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.606913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.606958] Call Trace:
[   21.606972]  <TASK>
[   21.606990]  dump_stack_lvl+0x73/0xb0
[   21.607018]  print_report+0xd1/0x650
[   21.607039]  ? __virt_addr_valid+0x1db/0x2d0
[   21.607061]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.607083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.607106]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.607128]  kasan_report+0x141/0x180
[   21.607165]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.607191]  __asan_report_store1_noabort+0x1b/0x30
[   21.607214]  krealloc_less_oob_helper+0xd47/0x11d0
[   21.607237]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.607258]  ? finish_task_switch.isra.0+0x153/0x700
[   21.607279]  ? __switch_to+0x47/0xf50
[   21.607304]  ? __schedule+0x10cc/0x2b60
[   21.607327]  ? __pfx_read_tsc+0x10/0x10
[   21.607351]  krealloc_less_oob+0x1c/0x30
[   21.607370]  kunit_try_run_case+0x1a5/0x480
[   21.607396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.607435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.607454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.607477]  ? __kthread_parkme+0x82/0x180
[   21.607512]  ? preempt_count_sub+0x50/0x80
[   21.607534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.607556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.607578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.607599]  kthread+0x337/0x6f0
[   21.607617]  ? trace_preempt_on+0x20/0xc0
[   21.607640]  ? __pfx_kthread+0x10/0x10
[   21.607659]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.607681]  ? calculate_sigpending+0x7b/0xa0
[   21.607703]  ? __pfx_kthread+0x10/0x10
[   21.607722]  ret_from_fork+0x116/0x1d0
[   21.607739]  ? __pfx_kthread+0x10/0x10
[   21.607758]  ret_from_fork_asm+0x1a/0x30
[   21.607786]  </TASK>
[   21.607796] 
[   21.615037] Allocated by task 187:
[   21.615308]  kasan_save_stack+0x45/0x70
[   21.615562]  kasan_save_track+0x18/0x40
[   21.615774]  kasan_save_alloc_info+0x3b/0x50
[   21.615976]  __kasan_krealloc+0x190/0x1f0
[   21.616196]  krealloc_noprof+0xf3/0x340
[   21.616360]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.616577]  krealloc_less_oob+0x1c/0x30
[   21.616760]  kunit_try_run_case+0x1a5/0x480
[   21.616964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.617184]  kthread+0x337/0x6f0
[   21.617413]  ret_from_fork+0x116/0x1d0
[   21.617579]  ret_from_fork_asm+0x1a/0x30
[   21.617727] 
[   21.617814] The buggy address belongs to the object at ffff88810038c800
[   21.617814]  which belongs to the cache kmalloc-256 of size 256
[   21.618377] The buggy address is located 34 bytes to the right of
[   21.618377]  allocated 201-byte region [ffff88810038c800, ffff88810038c8c9)
[   21.618850] 
[   21.618950] The buggy address belongs to the physical page:
[   21.619212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10038c
[   21.619566] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.619869] flags: 0x200000000000040(head|node=0|zone=2)
[   21.620142] page_type: f5(slab)
[   21.620273] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.620606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.620917] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.621338] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.621640] head: 0200000000000001 ffffea000400e301 00000000ffffffff 00000000ffffffff
[   21.622003] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.622341] page dumped because: kasan: bad access detected
[   21.622642] 
[   21.622730] Memory state around the buggy address:
[   21.622997]  ffff88810038c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.623301]  ffff88810038c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.623599] >ffff88810038c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.623854]                                                           ^
[   21.624050]  ffff88810038c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.624253]  ffff88810038c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.624460] ==================================================================
[   21.742038] ==================================================================
[   21.742354] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   21.742678] Write of size 1 at addr ffff88810291e0eb by task kunit_try_catch/191
[   21.743065] 
[   21.743295] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.743365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.743377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.743396] Call Trace:
[   21.743426]  <TASK>
[   21.743440]  dump_stack_lvl+0x73/0xb0
[   21.743464]  print_report+0xd1/0x650
[   21.743483]  ? __virt_addr_valid+0x1db/0x2d0
[   21.743505]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.743527]  ? kasan_addr_to_slab+0x11/0xa0
[   21.743545]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.743566]  kasan_report+0x141/0x180
[   21.743607]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   21.743632]  __asan_report_store1_noabort+0x1b/0x30
[   21.743655]  krealloc_less_oob_helper+0xd47/0x11d0
[   21.743678]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.743700]  ? irqentry_exit+0x2a/0x60
[   21.743718]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.743746]  krealloc_large_less_oob+0x1c/0x30
[   21.743766]  kunit_try_run_case+0x1a5/0x480
[   21.743790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.743843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.743864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.743963]  ? __kthread_parkme+0x82/0x180
[   21.743997]  ? preempt_count_sub+0x50/0x80
[   21.744018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.744041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.744077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.744112]  kthread+0x337/0x6f0
[   21.744130]  ? trace_preempt_on+0x20/0xc0
[   21.744164]  ? __pfx_kthread+0x10/0x10
[   21.744196]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.744218]  ? calculate_sigpending+0x7b/0xa0
[   21.744240]  ? __pfx_kthread+0x10/0x10
[   21.744260]  ret_from_fork+0x116/0x1d0
[   21.744278]  ? __pfx_kthread+0x10/0x10
[   21.744306]  ret_from_fork_asm+0x1a/0x30
[   21.744342]  </TASK>
[   21.744352] 
[   21.752736] The buggy address belongs to the physical page:
[   21.753449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c
[   21.753814] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.754416] flags: 0x200000000000040(head|node=0|zone=2)
[   21.754714] page_type: f8(unknown)
[   21.755241] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.755548] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.755852] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.756108] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.756586] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff
[   21.757049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.757290] page dumped because: kasan: bad access detected
[   21.757645] 
[   21.757757] Memory state around the buggy address:
[   21.758023]  ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.758360]  ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.758610] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.758951]                                                           ^
[   21.759307]  ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.759628]  ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.760115] ==================================================================
[   21.671956] ==================================================================
[   21.672510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   21.672814] Write of size 1 at addr ffff88810291e0c9 by task kunit_try_catch/191
[   21.673290] 
[   21.673389] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.673436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.673448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.673611] Call Trace:
[   21.673655]  <TASK>
[   21.673671]  dump_stack_lvl+0x73/0xb0
[   21.673700]  print_report+0xd1/0x650
[   21.673720]  ? __virt_addr_valid+0x1db/0x2d0
[   21.673743]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.673764]  ? kasan_addr_to_slab+0x11/0xa0
[   21.673783]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.673805]  kasan_report+0x141/0x180
[   21.673825]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.673850]  __asan_report_store1_noabort+0x1b/0x30
[   21.673872]  krealloc_less_oob_helper+0xd70/0x11d0
[   21.673895]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.673917]  ? irqentry_exit+0x2a/0x60
[   21.673996]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.674025]  krealloc_large_less_oob+0x1c/0x30
[   21.674045]  kunit_try_run_case+0x1a5/0x480
[   21.674071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.674092]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.674111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.674135]  ? __kthread_parkme+0x82/0x180
[   21.674154]  ? preempt_count_sub+0x50/0x80
[   21.674176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.674198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.674220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.674242]  kthread+0x337/0x6f0
[   21.674259]  ? trace_preempt_on+0x20/0xc0
[   21.674282]  ? __pfx_kthread+0x10/0x10
[   21.674301]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.674322]  ? calculate_sigpending+0x7b/0xa0
[   21.674344]  ? __pfx_kthread+0x10/0x10
[   21.674364]  ret_from_fork+0x116/0x1d0
[   21.674382]  ? __pfx_kthread+0x10/0x10
[   21.674401]  ret_from_fork_asm+0x1a/0x30
[   21.674430]  </TASK>
[   21.674440] 
[   21.682005] The buggy address belongs to the physical page:
[   21.682314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c
[   21.682538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.683077] flags: 0x200000000000040(head|node=0|zone=2)
[   21.683366] page_type: f8(unknown)
[   21.683617] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.684166] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.684530] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.684964] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.685460] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff
[   21.685758] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.686256] page dumped because: kasan: bad access detected
[   21.686564] 
[   21.686630] Memory state around the buggy address:
[   21.686830]  ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.687074]  ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.687274] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.687611]                                               ^
[   21.687914]  ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.688393]  ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.689127] ==================================================================
[   21.690243] ==================================================================
[   21.690613] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   21.691356] Write of size 1 at addr ffff88810291e0d0 by task kunit_try_catch/191
[   21.691813] 
[   21.692148] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.692198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.692210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.692229] Call Trace:
[   21.692244]  <TASK>
[   21.692258]  dump_stack_lvl+0x73/0xb0
[   21.692283]  print_report+0xd1/0x650
[   21.692303]  ? __virt_addr_valid+0x1db/0x2d0
[   21.692324]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.692356]  ? kasan_addr_to_slab+0x11/0xa0
[   21.692375]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.692396]  kasan_report+0x141/0x180
[   21.692416]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.692442]  __asan_report_store1_noabort+0x1b/0x30
[   21.692466]  krealloc_less_oob_helper+0xe23/0x11d0
[   21.692490]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.692512]  ? irqentry_exit+0x2a/0x60
[   21.692530]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.692558]  krealloc_large_less_oob+0x1c/0x30
[   21.692578]  kunit_try_run_case+0x1a5/0x480
[   21.692603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.692624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.692643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.692666]  ? __kthread_parkme+0x82/0x180
[   21.692685]  ? preempt_count_sub+0x50/0x80
[   21.692706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.692728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.692750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.692772]  kthread+0x337/0x6f0
[   21.692790]  ? trace_preempt_on+0x20/0xc0
[   21.692814]  ? __pfx_kthread+0x10/0x10
[   21.692832]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.692854]  ? calculate_sigpending+0x7b/0xa0
[   21.692876]  ? __pfx_kthread+0x10/0x10
[   21.692895]  ret_from_fork+0x116/0x1d0
[   21.692913]  ? __pfx_kthread+0x10/0x10
[   21.692931]  ret_from_fork_asm+0x1a/0x30
[   21.692970]  </TASK>
[   21.692980] 
[   21.700518] The buggy address belongs to the physical page:
[   21.700697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c
[   21.701223] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.701555] flags: 0x200000000000040(head|node=0|zone=2)
[   21.702258] page_type: f8(unknown)
[   21.702511] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.702839] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.703219] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.703554] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.703776] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff
[   21.704008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.704543] page dumped because: kasan: bad access detected
[   21.704885] 
[   21.705005] Memory state around the buggy address:
[   21.705258]  ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.705651]  ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.706039] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.706351]                                                  ^
[   21.706611]  ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.706832]  ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.707161] ==================================================================
[   21.582132] ==================================================================
[   21.582424] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   21.582700] Write of size 1 at addr ffff88810038c8ea by task kunit_try_catch/187
[   21.582929] 
[   21.583060] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.583106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.583117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.583321] Call Trace:
[   21.583347]  <TASK>
[   21.583366]  dump_stack_lvl+0x73/0xb0
[   21.583395]  print_report+0xd1/0x650
[   21.583416]  ? __virt_addr_valid+0x1db/0x2d0
[   21.583438]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.583459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.583483]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.583505]  kasan_report+0x141/0x180
[   21.583525]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.583550]  __asan_report_store1_noabort+0x1b/0x30
[   21.583572]  krealloc_less_oob_helper+0xe90/0x11d0
[   21.583596]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.583618]  ? finish_task_switch.isra.0+0x153/0x700
[   21.583639]  ? __switch_to+0x47/0xf50
[   21.583664]  ? __schedule+0x10cc/0x2b60
[   21.583687]  ? __pfx_read_tsc+0x10/0x10
[   21.583710]  krealloc_less_oob+0x1c/0x30
[   21.583729]  kunit_try_run_case+0x1a5/0x480
[   21.583754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.583774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.583793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.583816]  ? __kthread_parkme+0x82/0x180
[   21.583834]  ? preempt_count_sub+0x50/0x80
[   21.583855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.583877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.583899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.583920]  kthread+0x337/0x6f0
[   21.583950]  ? trace_preempt_on+0x20/0xc0
[   21.583972]  ? __pfx_kthread+0x10/0x10
[   21.583991]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.584012]  ? calculate_sigpending+0x7b/0xa0
[   21.584035]  ? __pfx_kthread+0x10/0x10
[   21.584054]  ret_from_fork+0x116/0x1d0
[   21.584071]  ? __pfx_kthread+0x10/0x10
[   21.584090]  ret_from_fork_asm+0x1a/0x30
[   21.584118]  </TASK>
[   21.584140] 
[   21.591506] Allocated by task 187:
[   21.591686]  kasan_save_stack+0x45/0x70
[   21.591881]  kasan_save_track+0x18/0x40
[   21.592078]  kasan_save_alloc_info+0x3b/0x50
[   21.592275]  __kasan_krealloc+0x190/0x1f0
[   21.592411]  krealloc_noprof+0xf3/0x340
[   21.592541]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.592691]  krealloc_less_oob+0x1c/0x30
[   21.592819]  kunit_try_run_case+0x1a5/0x480
[   21.592967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.593403]  kthread+0x337/0x6f0
[   21.593567]  ret_from_fork+0x116/0x1d0
[   21.593745]  ret_from_fork_asm+0x1a/0x30
[   21.593930] 
[   21.594028] The buggy address belongs to the object at ffff88810038c800
[   21.594028]  which belongs to the cache kmalloc-256 of size 256
[   21.594928] The buggy address is located 33 bytes to the right of
[   21.594928]  allocated 201-byte region [ffff88810038c800, ffff88810038c8c9)
[   21.596277] 
[   21.596361] The buggy address belongs to the physical page:
[   21.596609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10038c
[   21.597026] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.598401] flags: 0x200000000000040(head|node=0|zone=2)
[   21.598683] page_type: f5(slab)
[   21.598851] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.599590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.600053] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.600382] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.600781] head: 0200000000000001 ffffea000400e301 00000000ffffffff 00000000ffffffff
[   21.601217] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.601538] page dumped because: kasan: bad access detected
[   21.601772] 
[   21.601855] Memory state around the buggy address:
[   21.602129]  ffff88810038c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.602447]  ffff88810038c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.602747] >ffff88810038c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.603172]                                                           ^
[   21.603452]  ffff88810038c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.603764]  ffff88810038c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.604383] ==================================================================
[   21.541308] ==================================================================
[   21.541655] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   21.542081] Write of size 1 at addr ffff88810038c8d0 by task kunit_try_catch/187
[   21.542464] 
[   21.542548] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.542595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.542606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.542625] Call Trace:
[   21.542637]  <TASK>
[   21.542653]  dump_stack_lvl+0x73/0xb0
[   21.542680]  print_report+0xd1/0x650
[   21.542699]  ? __virt_addr_valid+0x1db/0x2d0
[   21.542722]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.542743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.542766]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.542788]  kasan_report+0x141/0x180
[   21.542807]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.542833]  __asan_report_store1_noabort+0x1b/0x30
[   21.542855]  krealloc_less_oob_helper+0xe23/0x11d0
[   21.542878]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.542899]  ? finish_task_switch.isra.0+0x153/0x700
[   21.542920]  ? __switch_to+0x47/0xf50
[   21.542957]  ? __schedule+0x10cc/0x2b60
[   21.542980]  ? __pfx_read_tsc+0x10/0x10
[   21.543003]  krealloc_less_oob+0x1c/0x30
[   21.543022]  kunit_try_run_case+0x1a5/0x480
[   21.543046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.543067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.543086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.543109]  ? __kthread_parkme+0x82/0x180
[   21.543177]  ? preempt_count_sub+0x50/0x80
[   21.543198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.543220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.543243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.543265]  kthread+0x337/0x6f0
[   21.543282]  ? trace_preempt_on+0x20/0xc0
[   21.543306]  ? __pfx_kthread+0x10/0x10
[   21.543325]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.543349]  ? calculate_sigpending+0x7b/0xa0
[   21.543372]  ? __pfx_kthread+0x10/0x10
[   21.543392]  ret_from_fork+0x116/0x1d0
[   21.543410]  ? __pfx_kthread+0x10/0x10
[   21.543428]  ret_from_fork_asm+0x1a/0x30
[   21.543456]  </TASK>
[   21.543466] 
[   21.550996] Allocated by task 187:
[   21.551122]  kasan_save_stack+0x45/0x70
[   21.551256]  kasan_save_track+0x18/0x40
[   21.551379]  kasan_save_alloc_info+0x3b/0x50
[   21.551517]  __kasan_krealloc+0x190/0x1f0
[   21.551645]  krealloc_noprof+0xf3/0x340
[   21.551774]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.551923]  krealloc_less_oob+0x1c/0x30
[   21.552490]  kunit_try_run_case+0x1a5/0x480
[   21.552713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.553228]  kthread+0x337/0x6f0
[   21.553394]  ret_from_fork+0x116/0x1d0
[   21.553571]  ret_from_fork_asm+0x1a/0x30
[   21.553736] 
[   21.553859] The buggy address belongs to the object at ffff88810038c800
[   21.553859]  which belongs to the cache kmalloc-256 of size 256
[   21.554352] The buggy address is located 7 bytes to the right of
[   21.554352]  allocated 201-byte region [ffff88810038c800, ffff88810038c8c9)
[   21.554714] 
[   21.554777] The buggy address belongs to the physical page:
[   21.555248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10038c
[   21.555612] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.555843] flags: 0x200000000000040(head|node=0|zone=2)
[   21.556042] page_type: f5(slab)
[   21.556262] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.556592] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.556861] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.557095] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.557714] head: 0200000000000001 ffffea000400e301 00000000ffffffff 00000000ffffffff
[   21.558050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.558270] page dumped because: kasan: bad access detected
[   21.558491] 
[   21.558578] Memory state around the buggy address:
[   21.558797]  ffff88810038c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.559164]  ffff88810038c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.559478] >ffff88810038c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.559759]                                                  ^
[   21.560271]  ffff88810038c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.560494]  ffff88810038c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.560698] ==================================================================
[   21.707765] ==================================================================
[   21.708209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   21.708666] Write of size 1 at addr ffff88810291e0da by task kunit_try_catch/191
[   21.709035] 
[   21.709141] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.709185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.709196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.709217] Call Trace:
[   21.709232]  <TASK>
[   21.709246]  dump_stack_lvl+0x73/0xb0
[   21.709271]  print_report+0xd1/0x650
[   21.709291]  ? __virt_addr_valid+0x1db/0x2d0
[   21.709312]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.709333]  ? kasan_addr_to_slab+0x11/0xa0
[   21.709352]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.709373]  kasan_report+0x141/0x180
[   21.709393]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.709418]  __asan_report_store1_noabort+0x1b/0x30
[   21.709440]  krealloc_less_oob_helper+0xec6/0x11d0
[   21.709486]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.709508]  ? irqentry_exit+0x2a/0x60
[   21.709527]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.709570]  krealloc_large_less_oob+0x1c/0x30
[   21.709591]  kunit_try_run_case+0x1a5/0x480
[   21.709617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.709639]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.709658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.709681]  ? __kthread_parkme+0x82/0x180
[   21.709700]  ? preempt_count_sub+0x50/0x80
[   21.709722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.709744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.709766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.709788]  kthread+0x337/0x6f0
[   21.709806]  ? trace_preempt_on+0x20/0xc0
[   21.709827]  ? __pfx_kthread+0x10/0x10
[   21.709863]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.709897]  ? calculate_sigpending+0x7b/0xa0
[   21.709919]  ? __pfx_kthread+0x10/0x10
[   21.709960]  ret_from_fork+0x116/0x1d0
[   21.709992]  ? __pfx_kthread+0x10/0x10
[   21.710011]  ret_from_fork_asm+0x1a/0x30
[   21.710040]  </TASK>
[   21.710063] 
[   21.717869] The buggy address belongs to the physical page:
[   21.718192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c
[   21.718604] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.719145] flags: 0x200000000000040(head|node=0|zone=2)
[   21.719349] page_type: f8(unknown)
[   21.719505] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.719754] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.720316] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.720629] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.721264] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff
[   21.721638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.721987] page dumped because: kasan: bad access detected
[   21.722227] 
[   21.722352] Memory state around the buggy address:
[   21.722546]  ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.722749]  ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.723345] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.723645]                                                     ^
[   21.723896]  ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.724484]  ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.724801] ==================================================================
[   21.725192] ==================================================================
[   21.725419] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   21.725692] Write of size 1 at addr ffff88810291e0ea by task kunit_try_catch/191
[   21.726118] 
[   21.726287] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.726351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.726363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.726382] Call Trace:
[   21.726396]  <TASK>
[   21.726428]  dump_stack_lvl+0x73/0xb0
[   21.726452]  print_report+0xd1/0x650
[   21.726472]  ? __virt_addr_valid+0x1db/0x2d0
[   21.726493]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.726514]  ? kasan_addr_to_slab+0x11/0xa0
[   21.726535]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.726556]  kasan_report+0x141/0x180
[   21.726576]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   21.726601]  __asan_report_store1_noabort+0x1b/0x30
[   21.726624]  krealloc_less_oob_helper+0xe90/0x11d0
[   21.726647]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.726669]  ? irqentry_exit+0x2a/0x60
[   21.726688]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   21.726717]  krealloc_large_less_oob+0x1c/0x30
[   21.726738]  kunit_try_run_case+0x1a5/0x480
[   21.726762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.726802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.726859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.726885]  ? __kthread_parkme+0x82/0x180
[   21.726924]  ? preempt_count_sub+0x50/0x80
[   21.726958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.726980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.727002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.727024]  kthread+0x337/0x6f0
[   21.727042]  ? trace_preempt_on+0x20/0xc0
[   21.727063]  ? __pfx_kthread+0x10/0x10
[   21.727098]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.727129]  ? calculate_sigpending+0x7b/0xa0
[   21.727152]  ? __pfx_kthread+0x10/0x10
[   21.727172]  ret_from_fork+0x116/0x1d0
[   21.727189]  ? __pfx_kthread+0x10/0x10
[   21.727208]  ret_from_fork_asm+0x1a/0x30
[   21.727237]  </TASK>
[   21.727247] 
[   21.734835] The buggy address belongs to the physical page:
[   21.735091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10291c
[   21.735564] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.735791] flags: 0x200000000000040(head|node=0|zone=2)
[   21.735962] page_type: f8(unknown)
[   21.736313] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.736658] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.737230] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.737590] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   21.738038] head: 0200000000000002 ffffea00040a4701 00000000ffffffff 00000000ffffffff
[   21.738389] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.738713] page dumped because: kasan: bad access detected
[   21.738969] 
[   21.739053] Memory state around the buggy address:
[   21.739267]  ffff88810291df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.739635]  ffff88810291e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.739844] >ffff88810291e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.740054]                                                           ^
[   21.740682]  ffff88810291e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.741324]  ffff88810291e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.741637] ==================================================================
[   21.521110] ==================================================================
[   21.521542] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   21.521850] Write of size 1 at addr ffff88810038c8c9 by task kunit_try_catch/187
[   21.522428] 
[   21.522528] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.522576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.522588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.522609] Call Trace:
[   21.522621]  <TASK>
[   21.522636]  dump_stack_lvl+0x73/0xb0
[   21.522663]  print_report+0xd1/0x650
[   21.522683]  ? __virt_addr_valid+0x1db/0x2d0
[   21.522705]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.522726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.522750]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.522772]  kasan_report+0x141/0x180
[   21.522791]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.522817]  __asan_report_store1_noabort+0x1b/0x30
[   21.522838]  krealloc_less_oob_helper+0xd70/0x11d0
[   21.522862]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.522883]  ? finish_task_switch.isra.0+0x153/0x700
[   21.522903]  ? __switch_to+0x47/0xf50
[   21.522956]  ? __schedule+0x10cc/0x2b60
[   21.522980]  ? __pfx_read_tsc+0x10/0x10
[   21.523004]  krealloc_less_oob+0x1c/0x30
[   21.523023]  kunit_try_run_case+0x1a5/0x480
[   21.523047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.523068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.523088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.523112]  ? __kthread_parkme+0x82/0x180
[   21.523130]  ? preempt_count_sub+0x50/0x80
[   21.523152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.523175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.523196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.523218]  kthread+0x337/0x6f0
[   21.523236]  ? trace_preempt_on+0x20/0xc0
[   21.523258]  ? __pfx_kthread+0x10/0x10
[   21.523277]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.523298]  ? calculate_sigpending+0x7b/0xa0
[   21.523320]  ? __pfx_kthread+0x10/0x10
[   21.523340]  ret_from_fork+0x116/0x1d0
[   21.523357]  ? __pfx_kthread+0x10/0x10
[   21.523429]  ret_from_fork_asm+0x1a/0x30
[   21.523463]  </TASK>
[   21.523473] 
[   21.530959] Allocated by task 187:
[   21.531311]  kasan_save_stack+0x45/0x70
[   21.531484]  kasan_save_track+0x18/0x40
[   21.531642]  kasan_save_alloc_info+0x3b/0x50
[   21.531812]  __kasan_krealloc+0x190/0x1f0
[   21.532001]  krealloc_noprof+0xf3/0x340
[   21.532231]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.532463]  krealloc_less_oob+0x1c/0x30
[   21.532590]  kunit_try_run_case+0x1a5/0x480
[   21.532761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.533277]  kthread+0x337/0x6f0
[   21.533449]  ret_from_fork+0x116/0x1d0
[   21.533619]  ret_from_fork_asm+0x1a/0x30
[   21.533768] 
[   21.533856] The buggy address belongs to the object at ffff88810038c800
[   21.533856]  which belongs to the cache kmalloc-256 of size 256
[   21.534381] The buggy address is located 0 bytes to the right of
[   21.534381]  allocated 201-byte region [ffff88810038c800, ffff88810038c8c9)
[   21.534865] 
[   21.534928] The buggy address belongs to the physical page:
[   21.535101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10038c
[   21.535439] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.535781] flags: 0x200000000000040(head|node=0|zone=2)
[   21.535980] page_type: f5(slab)
[   21.536094] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.536514] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.536839] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.537166] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.537422] head: 0200000000000001 ffffea000400e301 00000000ffffffff 00000000ffffffff
[   21.537751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.538045] page dumped because: kasan: bad access detected
[   21.538341] 
[   21.538406] Memory state around the buggy address:
[   21.538597]  ffff88810038c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.538802]  ffff88810038c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.539018] >ffff88810038c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.539365]                                               ^
[   21.539614]  ffff88810038c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.539918]  ffff88810038c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540222] ==================================================================
[   21.561181] ==================================================================
[   21.561771] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   21.562130] Write of size 1 at addr ffff88810038c8da by task kunit_try_catch/187
[   21.562456] 
[   21.562557] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   21.562601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.562612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.562632] Call Trace:
[   21.562649]  <TASK>
[   21.562664]  dump_stack_lvl+0x73/0xb0
[   21.562687]  print_report+0xd1/0x650
[   21.562707]  ? __virt_addr_valid+0x1db/0x2d0
[   21.562728]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.562749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.562773]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.562794]  kasan_report+0x141/0x180
[   21.562814]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.562839]  __asan_report_store1_noabort+0x1b/0x30
[   21.562861]  krealloc_less_oob_helper+0xec6/0x11d0
[   21.562884]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.562906]  ? finish_task_switch.isra.0+0x153/0x700
[   21.562925]  ? __switch_to+0x47/0xf50
[   21.562961]  ? __schedule+0x10cc/0x2b60
[   21.562984]  ? __pfx_read_tsc+0x10/0x10
[   21.563007]  krealloc_less_oob+0x1c/0x30
[   21.563026]  kunit_try_run_case+0x1a5/0x480
[   21.563049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.563070]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.563089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.563112]  ? __kthread_parkme+0x82/0x180
[   21.563187]  ? preempt_count_sub+0x50/0x80
[   21.563208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.563231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.563252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.563274]  kthread+0x337/0x6f0
[   21.563292]  ? trace_preempt_on+0x20/0xc0
[   21.563314]  ? __pfx_kthread+0x10/0x10
[   21.563332]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.563354]  ? calculate_sigpending+0x7b/0xa0
[   21.563376]  ? __pfx_kthread+0x10/0x10
[   21.563395]  ret_from_fork+0x116/0x1d0
[   21.563412]  ? __pfx_kthread+0x10/0x10
[   21.563431]  ret_from_fork_asm+0x1a/0x30
[   21.563458]  </TASK>
[   21.563468] 
[   21.571260] Allocated by task 187:
[   21.571500]  kasan_save_stack+0x45/0x70
[   21.571638]  kasan_save_track+0x18/0x40
[   21.571762]  kasan_save_alloc_info+0x3b/0x50
[   21.571900]  __kasan_krealloc+0x190/0x1f0
[   21.572041]  krealloc_noprof+0xf3/0x340
[   21.572198]  krealloc_less_oob_helper+0x1aa/0x11d0
[   21.572608]  krealloc_less_oob+0x1c/0x30
[   21.572801]  kunit_try_run_case+0x1a5/0x480
[   21.573016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.573346]  kthread+0x337/0x6f0
[   21.573457]  ret_from_fork+0x116/0x1d0
[   21.573577]  ret_from_fork_asm+0x1a/0x30
[   21.573703] 
[   21.573765] The buggy address belongs to the object at ffff88810038c800
[   21.573765]  which belongs to the cache kmalloc-256 of size 256
[   21.574115] The buggy address is located 17 bytes to the right of
[   21.574115]  allocated 201-byte region [ffff88810038c800, ffff88810038c8c9)
[   21.575200] 
[   21.575296] The buggy address belongs to the physical page:
[   21.575542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10038c
[   21.575893] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.576230] flags: 0x200000000000040(head|node=0|zone=2)
[   21.576400] page_type: f5(slab)
[   21.576561] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.576780] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.577598] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.578057] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.578761] head: 0200000000000001 ffffea000400e301 00000000ffffffff 00000000ffffffff
[   21.579073] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.579420] page dumped because: kasan: bad access detected
[   21.579616] 
[   21.579702] Memory state around the buggy address:
[   21.579872]  ffff88810038c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.580088]  ffff88810038c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.580296] >ffff88810038c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.580504]                                                     ^
[   21.580866]  ffff88810038c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581282]  ffff88810038c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581593] ==================================================================